CN112637169B - Passive NFC cloud lock encryption method - Google Patents

Passive NFC cloud lock encryption method Download PDF

Info

Publication number
CN112637169B
CN112637169B CN202011480308.2A CN202011480308A CN112637169B CN 112637169 B CN112637169 B CN 112637169B CN 202011480308 A CN202011480308 A CN 202011480308A CN 112637169 B CN112637169 B CN 112637169B
Authority
CN
China
Prior art keywords
passive nfc
cloud lock
cloud
terminal
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011480308.2A
Other languages
Chinese (zh)
Other versions
CN112637169A (en
Inventor
王锐
严海华
李建军
王亚波
莫军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unicmicro Guangzhou Co ltd
Original Assignee
Unicmicro Guangzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unicmicro Guangzhou Co ltd filed Critical Unicmicro Guangzhou Co ltd
Priority to CN202011480308.2A priority Critical patent/CN112637169B/en
Publication of CN112637169A publication Critical patent/CN112637169A/en
Application granted granted Critical
Publication of CN112637169B publication Critical patent/CN112637169B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a passive NFC cloud lock encryption method, which comprises the following steps: responding to a starting instruction of the passive NFC cloud lock terminal, and sending a cloud lock initialization request to the cloud platform; receiving initialization data generated by the cloud platform in response to the cloud lock initialization request, and forwarding the initialization data to the passive NFC cloud lock terminal; the initialization data comprises an unlocking type, a secret key and a vector table, wherein the secret key and the vector table are randomly generated according to a preset rule; forwarding the key information fed back by the passive NFC cloud lock terminal to a cloud platform, so that the cloud platform stores the key information of the passive NFC cloud lock terminal; the key information comprises a unique UID (user identifier), a random number, a key and a vector table of the passive NFC cloud lock terminal. The invention avoids the occurrence of system security problems caused by secret key leakage or decryption by adopting the randomly generated secret key and the random vector, thereby effectively improving the security of data encryption.

Description

Passive NFC cloud lock encryption method
Technical Field
The invention relates to the technical field of data encryption, in particular to a passive NFC cloud lock encryption method.
Background
With the development of market economy, technologies such as cloud computing and the internet of things are developed at a high speed, computer networks enter the big data era quietly, the traditional network information safety hardly meets the requirements of the big data, and potential safety hazards are brought to data transmission due to unstructured and diversified sources of the big data. In the big data era, on one hand, under the condition of using a traditional transmission protocol, rapidly increased mass data can be attacked by hackers by utilizing protocol bugs, and data stealing occurs in the transmission process, on the other hand, the network in the big data era focuses more on wireless transmission, and has stronger openness, and data is easier to intercept under the environment. Therefore, when data transmission is carried out, data needs to be encrypted and then transmitted, and therefore data security can be improved. In the prior art, a fixed secret key is defined by two parties when data transmission is encrypted and decrypted, once the secret key is decrypted, the whole system is decrypted, the fixed secret key is easy to be leaked, and the safety is low.
Disclosure of Invention
The invention aims to provide a passive NFC cloud lock encryption method to solve the technical problem, so that the security of data encryption is effectively improved.
In order to solve the technical problem, an embodiment of the present invention provides a passive NFC cloud lock encryption method, including:
responding to a starting instruction of the passive NFC cloud lock terminal, and sending a cloud lock initialization request to the cloud platform;
receiving initialization data generated by the cloud platform in response to the cloud lock initialization request, and forwarding the initialization data to the passive NFC cloud lock terminal; the initialization data comprises an unlocking type, an encryption key and a vector table, wherein the encryption key and the vector table are randomly generated according to a preset rule;
forwarding the key information fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform stores the key information of the passive NFC cloud lock terminal; the secret key information comprises a unique UID (user identifier), a random number, a secret key and a vector table of the passive NFC cloud lock terminal.
Further, the passive NFC cloud lock encryption method further includes:
sending an unlocking instruction to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal feeds back a unique UID of the passive NFC cloud lock terminal;
generating an unlocking request according to the unique UID and sending the unlocking request to the cloud platform, so that the cloud platform inquires and obtains key information corresponding to the passive NFC cloud lock terminal according to the unique UID and then encrypts the key information into an unlocking type information packet and feeds the unlocking type information packet back;
forwarding the received unlocking type information packet to the passive NFC cloud lock terminal, so that the passive NFC cloud lock terminal encrypts and packages the unique UID of the passive NFC cloud lock terminal, the newly generated random number and the unlocking verification code into a verification data packet and feeds the verification data packet back;
forwarding the verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts the verification data packet by using the secret key and feeds back verification result information after verification;
and forwarding the verification result information to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal judges whether to unlock according to the verification result information.
Further, the secret key information is fed back after the passive NFC cloud lock terminal encrypts by using the secret key.
Further, the forwarding of the verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform to enable the cloud platform to decrypt the verification data packet by using the secret key and feed back verification result information after verification, specifically:
and forwarding the verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts and verifies the verification data packet by using the secret key, and the cloud platform encrypts and feeds back verification result information and unlocking authority information by using the secret key.
In order to solve the same technical problem, the invention also provides a passive NFC cloud lock encryption method, which includes:
the mobile terminal responds to a starting instruction of the passive NFC cloud lock terminal and sends a cloud lock initialization request to the cloud platform;
the cloud platform responds to the cloud lock initialization request, generates initialization data and feeds the initialization data back to the mobile terminal; the initialization data comprises an unlocking type, an encryption key and a vector table, wherein the encryption key and the vector table are randomly generated according to a preset rule;
the mobile terminal receives the initialization data and forwards the initialization data to the passive NFC cloud lock terminal;
the mobile terminal forwards the key information fed back by the passive NFC cloud lock terminal to the cloud platform; the secret key information comprises a unique UID (user identifier), a random number, a secret key and a vector table of the passive NFC cloud lock terminal;
and the cloud platform stores the key information of the passive NFC cloud lock terminal.
Further, the passive NFC cloud lock encryption method further includes:
the mobile terminal sends an unlocking instruction to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal feeds back the unique UID of the passive NFC cloud lock terminal;
the mobile terminal generates an unlocking request according to the unique UID and sends the unlocking request to the cloud platform;
the cloud platform inquires and obtains key information corresponding to the passive NFC cloud lock terminal according to the unique UID, encrypts the key information into an unlocking type information packet and feeds the unlocking type information packet back to the mobile terminal;
the mobile terminal forwards the received unlocking type information packet to the passive NFC cloud lock terminal;
the passive NFC cloud lock terminal encrypts and packages the unique UID, the newly generated random number and the unlocking verification code of the passive NFC cloud lock terminal into a verification data packet and feeds the verification data packet back to the mobile terminal;
the mobile terminal forwards the verification data packet to the cloud platform;
the cloud platform decrypts the verification data packet by using the secret key, verifies the verification data packet and feeds back verification result information to the mobile terminal;
and the mobile terminal forwards the verification result information to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal judges whether to unlock according to the verification result information.
Further, the secret key information is fed back after the passive NFC cloud lock terminal encrypts by using the secret key.
Further, the cloud platform decrypts the verification data packet by using the secret key, and feeds back verification result information to the mobile terminal after verification, which specifically includes:
and the cloud platform decrypts and verifies the verification data packet by adopting the secret key, encrypts verification result information and unlocking authority information by adopting the secret key and feeds back the verification result information and the unlocking authority information to the mobile terminal.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides a passive NFC cloud lock encryption method, which comprises the following steps: responding to a starting instruction of the passive NFC cloud lock terminal, and sending a cloud lock initialization request to the cloud platform; receiving initialization data generated by the cloud platform in response to the cloud lock initialization request, and forwarding the initialization data to the passive NFC cloud lock terminal; the initialization data comprises an unlocking type, an encryption key and a vector table, wherein the encryption key and the vector table are randomly generated according to a preset rule; forwarding the key information fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform stores the key information of the passive NFC cloud lock terminal; the secret key information comprises a unique UID (user identifier), a random number, a secret key and a vector table of the passive NFC cloud lock terminal. The invention avoids the occurrence of system security problems caused by secret key leakage or decryption by adopting the randomly generated secret key and the random vector, thereby effectively improving the security of data encryption.
Drawings
Fig. 1 is a schematic flowchart of a passive NFC cloud lock encryption method according to an embodiment of the present invention;
fig. 2 is a schematic system architecture diagram of a passive NFC cloud lock system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating an interaction flow of entry lock information according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an unlocking interaction flow according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of a passive NFC cloud lock encryption method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
referring to fig. 1, an embodiment of the present invention provides a passive NFC cloud lock encryption method, including:
s1, responding to a starting instruction of the passive NFC cloud lock terminal, and sending a cloud lock initialization request to the cloud platform;
s2, receiving initialization data generated by the cloud platform in response to the cloud lock initialization request, and forwarding the initialization data to the passive NFC cloud lock terminal; the initialization data comprises an unlocking type, an encryption key and a vector table, wherein the encryption key and the vector table are randomly generated according to a preset rule;
s3, forwarding the key information fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform stores the key information of the passive NFC cloud lock terminal; the secret key information comprises a unique UID (user identifier), a random number, a secret key and a vector table of the passive NFC cloud lock terminal. In the embodiment of the present invention, further, the key information is fed back after the passive NFC cloud lock terminal encrypts by using the key.
Further, the passive NFC cloud lock encryption method further includes:
s4, sending an unlocking instruction to the passive NFC cloud lock terminal to enable the passive NFC cloud lock terminal to feed back the unique UID of the passive NFC cloud lock terminal;
s5, generating an unlocking request according to the unique UID and sending the unlocking request to the cloud platform, so that the cloud platform can obtain secret key information corresponding to the passive NFC cloud lock terminal according to the unique UID, encrypt the secret key information into an unlocking type information packet and feed back the information packet;
s6, forwarding the received unlocking type information packet to the passive NFC cloud lock terminal, so that the passive NFC cloud lock terminal encrypts and packages the unique UID of the passive NFC cloud lock terminal, the newly generated random number and the unlocking verification code into a verification data packet and feeds the verification data packet back;
s7, forwarding a verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts the verification data packet by using the secret key and feeds back verification result information after verification;
s8, the verification result information is forwarded to the passive NFC cloud lock terminal, so that the passive NFC cloud lock terminal judges whether to unlock according to the verification result information.
In the embodiment of the present invention, further, step S7 specifically includes:
and forwarding the verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts and verifies the verification data packet by using the secret key, and the cloud platform encrypts and feeds back verification result information and unlocking authority information by using the secret key.
It should be noted that the embodiment of the present invention provides a passive NFC cloud lock encryption method based on data management. The system related to the method comprises a passive NFC cloud lock terminal, a mobile phone APP and a cloud platform. When a mobile phone is close to a passive NFC cloud lock terminal, the terminal collects mobile phone energy through an antenna, after the terminal runs, the terminal communicates with a mobile phone APP through an NFC interface, and then the mobile phone APP communicates with a cloud platform through 4G or wifi.
Based on the above scheme, in order to better understand the passive NFC cloud lock encryption method provided by the embodiment of the present invention, the following detailed description is made:
the system mainly comprises a passive NFC cloud lock terminal, a mobile phone APP and a cloud platform, and the system architecture is shown in figure 2.
The basic principle of the system is as follows: when the mobile phone is close to and is close to passive NFC cloud lock terminal, the terminal antenna generates magnetic field energy through collecting the mobile phone and converts the magnetic field energy into direct current, after the terminal can normally operate, the terminal communicates with a mobile phone APP through an NFC interface, and the mobile phone APP communicates with a cloud platform through 4G or wifi. In order to uniformly manage the passive NFC cloud lock by using the cloud platform, before the lock is installed, the lock needs to be recorded into a system, information such as a unique ID of the lock is mainly recorded into the cloud platform, the cloud platform generates a random secret key and a random vector table, and then the random secret key and the random vector table are stored into the cloud platform and a terminal through data interaction.
Referring to fig. 3, the interaction flow of entering lock information is as follows:
when a mobile phone is close to a passive NFC cloud lock terminal, after the terminal collects energy and runs, the mobile phone APP starts to request types, vectors and secret keys from a cloud platform, after the cloud platform receives the request, the secret keys and the vector table are randomly generated and returned to the APP, each time the secret keys and the vectors are randomly generated, repeated secret keys and vectors cannot appear, data are transmitted after fixed secret key encryption is adopted by equipment which does not enter a system, after the type, the secret keys and the vectors are received by the mobile phone, the secret keys and the vectors are forwarded to the passive NFC cloud lock terminal, after the secret keys and the vectors are decrypted through the fixation, a new secret key is obtained to replace the fixed secret keys and is simultaneously fed back to the cloud platform, and the new secret keys and the vectors are stored in corresponding lock UID data. After the two parties save the new key, the data transmission adopts the new key to encrypt and decrypt the data, and then the data is transmitted, so that the key and the vector adopted by each terminal in the transmission for encryption and decryption are inconsistent, and the security of the transmitted data can be improved.
Referring to fig. 4, the unlocking interaction flow is as follows:
when the unlocking interface of the APP is opened by the mobile phone, the mobile phone is close to the passive NFC cloud lock terminal, after the terminal collects energy and runs, the mobile phone obtains the only UID of the lock, then the cloud platform is requested, the cloud platform finds out the secret key and the vector corresponding to the current passive NFC cloud lock terminal through the UID, then the unlocking type is encrypted, the unlocking type is obtained and transmitted to the mobile phone APP, the mobile phone APP forwards data to the terminal, the terminal decrypts the secret key according to the secret key, the unlocking type is obtained, and the unlocking type is mainly used for judging whether the lock is in the system. In order to prevent that data after unlocking and encrypting every time are the same, random numbers are added before the data are encrypted, the data encrypted every time are different, the UID, the random numbers and the unlocking codes are encrypted and then interacted with the mobile phone through an NFC interface, the mobile phone APP forwards the data to the cloud platform after receiving the data, the cloud platform decrypts the secret key found out through the UID, and then whether the user can unlock or not is judged according to user authority and locking authority management. And then, the result is encrypted by using a new secret key and then transmitted to the mobile phone, and then forwarded to the passive NFC cloud lock terminal, and after the terminal decrypts the result, whether the lock is unlocked is judged according to the returned result.
It should be noted that the encryption key and the vector for data transmission are generated randomly, which ensures that the key and the vector of each passive NFC cloud lock are inconsistent, and requests that random data is added each time in the unlocking process, so that the data after each encryption is inconsistent, and thus the security of data transmission can be increased.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
1. the random secret key and the random vector are managed by the cloud platform, and the condition that the secret leakage of the secret key and the vector causes the unsafe condition of the system is avoided.
2. The safety of data transmission is effectively improved.
Example 2:
referring to fig. 5, in order to solve the same technical problem, the present invention further provides a passive NFC cloud lock encryption method, including the steps of:
s1, the mobile terminal responds to a starting instruction of the passive NFC cloud lock terminal and sends a cloud lock initialization request to the cloud platform;
s2, the cloud platform responds to the cloud lock initialization request, generates initialization data and feeds the initialization data back to the mobile terminal; the initialization data comprises an unlocking type, an encryption key and a vector table, wherein the encryption key and the vector table are randomly generated according to a preset rule;
s3, the mobile terminal receives the initialization data and forwards the initialization data to the passive NFC cloud lock terminal;
s4, the mobile terminal forwards the key information fed back by the passive NFC cloud lock terminal to the cloud platform; the secret key information comprises a unique UID (user identifier), a random number, a secret key and a vector table of the passive NFC cloud lock terminal; further, the secret key information is fed back after the passive NFC cloud lock terminal encrypts by using the secret key.
And S5, the cloud platform stores the key information of the passive NFC cloud lock terminal.
In this embodiment of the present invention, further, the passive NFC cloud lock encryption method further includes:
s6, the mobile terminal sends an unlocking instruction to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal can feed back the unique UID of the passive NFC cloud lock terminal;
s7, the mobile terminal generates an unlocking request according to the unique UID and sends the unlocking request to the cloud platform;
s8, the cloud platform inquires and obtains key information corresponding to the passive NFC cloud lock terminal according to the unique UID, encrypts the key information into an unlocking type information packet and feeds the unlocking type information packet back to the mobile terminal;
s9, the mobile terminal forwards the received unlocking type information packet to the passive NFC cloud lock terminal;
s10, the passive NFC cloud lock terminal encrypts and packages the unique UID, the newly generated random number and the unlocking verification code of the passive NFC cloud lock terminal into a verification data packet and feeds the verification data packet back to the mobile terminal;
s11, the mobile terminal forwards the verification data packet to the cloud platform;
s12, the cloud platform decrypts the verification data packet by using the secret key, and feeds back verification result information to the mobile terminal after verification;
and S13, the mobile terminal forwards the verification result information to the passive NFC cloud lock terminal, so that the passive NFC cloud lock terminal judges whether to unlock according to the verification result information.
Further, step S12 is specifically:
and the cloud platform decrypts and verifies the verification data packet by adopting the secret key, encrypts verification result information and unlocking authority information by adopting the secret key and feeds back the verification result information and the unlocking authority information to the mobile terminal.
It can be understood that the passive NFC cloud lock encryption method provided in embodiment 2 is a multi-end writing method of the passive NFC cloud lock encryption method provided in embodiment 1, and technical means and technical effects adopted by the two methods are all consistent and are not described herein again.
It should be noted that the above method or flow embodiment is described as a series of acts or combinations for simplicity, but those skilled in the art should understand that the present invention is not limited by the described acts or sequences, as some steps may be performed in other sequences or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are exemplary embodiments and that no single embodiment is necessarily required by the inventive embodiments.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (3)

1. A passive NFC cloud lock encryption method is characterized by comprising the following steps:
the mobile terminal responds to a starting instruction of the passive NFC cloud lock terminal and sends a cloud lock initialization request to the cloud platform;
the mobile terminal receives initialization data generated by the cloud platform in response to the cloud lock initialization request, and forwards the initialization data to the passive NFC cloud lock terminal; the initialization data comprises an unlocking type, an encryption key and a vector table, wherein the encryption key and the vector table are randomly generated according to a preset rule;
the mobile terminal forwards the key information fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform stores the key information of the passive NFC cloud lock terminal; the secret key information is fed back after the passive NFC cloud lock terminal adopts the secret key to encrypt, and the secret key information comprises a unique UID, a random number, a secret key and a vector table of the passive NFC cloud lock terminal.
2. The passive NFC cloud lock encryption method according to claim 1, wherein after the cloud platform saves the key information of the passive NFC cloud lock terminal, the method further includes:
the mobile terminal sends an unlocking instruction to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal feeds back the unique UID of the passive NFC cloud lock terminal;
the mobile terminal generates an unlocking request according to the unique UID and sends the unlocking request to the cloud platform, so that the cloud platform inquires and obtains secret key information corresponding to the passive NFC cloud lock terminal according to the unique UID and then encrypts the secret key information into an unlocking type information packet and feeds the unlocking type information packet back;
the mobile terminal forwards the received unlocking type information packet to the passive NFC cloud lock terminal, so that the passive NFC cloud lock terminal encrypts and packages the unique UID of the passive NFC cloud lock terminal, the newly generated random number and the unlocking verification code into a verification data packet and feeds the verification data packet back;
the mobile terminal forwards a verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts the verification data packet by using the secret key and feeds back verification result information after verification;
and the mobile terminal forwards the verification result information to the passive NFC cloud lock terminal so that the passive NFC cloud lock terminal judges whether to unlock according to the verification result information.
3. The passive NFC cloud lock encryption method according to claim 2, wherein the mobile terminal forwards a verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts the verification data packet by using the secret key and feeds back verification result information after verification, specifically:
the mobile terminal forwards a verification data packet fed back by the passive NFC cloud lock terminal to the cloud platform, so that the cloud platform decrypts and verifies the verification data packet by using the secret key, and the cloud platform encrypts verification result information and unlocking authority information by using the secret key and then feeds back the verification result information and the unlocking authority information.
CN202011480308.2A 2020-12-14 2020-12-14 Passive NFC cloud lock encryption method Active CN112637169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011480308.2A CN112637169B (en) 2020-12-14 2020-12-14 Passive NFC cloud lock encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011480308.2A CN112637169B (en) 2020-12-14 2020-12-14 Passive NFC cloud lock encryption method

Publications (2)

Publication Number Publication Date
CN112637169A CN112637169A (en) 2021-04-09
CN112637169B true CN112637169B (en) 2021-10-12

Family

ID=75313229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011480308.2A Active CN112637169B (en) 2020-12-14 2020-12-14 Passive NFC cloud lock encryption method

Country Status (1)

Country Link
CN (1) CN112637169B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282944B (en) * 2021-06-29 2023-03-10 珠海优特电力科技股份有限公司 Intelligent lock unlocking method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107507303A (en) * 2017-07-07 2017-12-22 安徽德诺科技股份公司 The method for unlocking of intelligent lock system and smart lock
CN109472908A (en) * 2019-01-04 2019-03-15 恒鸿达科技有限公司 A kind of intelligence lock administration system and method
CN110473327A (en) * 2019-09-05 2019-11-19 广东纬德信息科技有限公司 A kind of lock control method based on NFC, system and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2945137B1 (en) * 2009-04-30 2011-06-24 Pascal Metivier PROGRAMMING SYSTEM FOR A LOCK COMPRISING NFC-CONTACTLESS CONTACT COMMUNICATION MEANS
CN107968781B (en) * 2017-11-23 2021-04-30 大陆投资(中国)有限公司 Safety processing method for vehicle sharing service
CN109285288A (en) * 2018-07-25 2019-01-29 顺丰科技有限公司 A kind of passive intelligent cabinet
CN109377598A (en) * 2018-09-21 2019-02-22 广东汇泰龙科技有限公司 A kind of intelligent cloud lock communication means, communication system based on Contiki system
CN110211268B (en) * 2019-06-04 2021-07-20 北京一砂信息技术有限公司 System and method for unlocking intelligent lock by time-efficient random password and storage medium
CN110570561A (en) * 2019-08-22 2019-12-13 深圳市爱云信息科技有限公司 Unlocking method and system based on NFC electronic lock

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107507303A (en) * 2017-07-07 2017-12-22 安徽德诺科技股份公司 The method for unlocking of intelligent lock system and smart lock
CN109472908A (en) * 2019-01-04 2019-03-15 恒鸿达科技有限公司 A kind of intelligence lock administration system and method
CN110473327A (en) * 2019-09-05 2019-11-19 广东纬德信息科技有限公司 A kind of lock control method based on NFC, system and storage medium

Also Published As

Publication number Publication date
CN112637169A (en) 2021-04-09

Similar Documents

Publication Publication Date Title
US8447970B2 (en) Securing out-of-band messages
US7234057B2 (en) Method for processing access-request message for packet service
US8904195B1 (en) Methods and systems for secure communications between client applications and secure elements in mobile devices
CN108809633B (en) Identity authentication method, device and system
CN110545252B (en) Authentication and information protection method, terminal, control function entity and application server
CN101621794A (en) Method for realizing safe authentication of wireless application service system
US7913096B2 (en) Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN108319857B (en) Trusted application locking and unlocking method and system
CN112566119A (en) Terminal authentication method and device, computer equipment and storage medium
CN111080856A (en) Bluetooth entrance guard unlocking method
CN112637169B (en) Passive NFC cloud lock encryption method
CN114765543A (en) Encryption communication method and system of quantum cryptography network expansion equipment
CN108737087B (en) Protection method for mailbox account password and computer readable storage medium
CN115473655A (en) Terminal authentication method, device and storage medium for access network
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
CN116233832A (en) Verification information sending method and device
CN112995140B (en) Safety management system and method
CN114282189A (en) Data security storage method, system, client and server
CN114785527A (en) Data transmission method, device, equipment and storage medium
Nishimura et al. Secure authentication key sharing between personal mobile devices based on owner identity
CN108881153B (en) Authentication method for login
CN111800791A (en) Authentication method, core network equipment and terminal
CN112752265A (en) Access control method and device for network slice and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant